[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[FD] RootExplorer remote code execution
- To: fulldisclosure@xxxxxxxxxxxx
- Subject: [FD] RootExplorer remote code execution
- From: 0x3d5157636b525761 iddqd <0x3d5157636b525761@xxxxxxxxx>
- Date: Sat, 9 Jul 2016 13:12:14 +0300
Disclosure timeline
=====================
June 11th: discovered issues.
June 12th: contacted App developer.
June 12th: App developer replies that the new App is not ready yet, but
will not download assets from HTTP.
June 13th: asked how much time it'll take to fix, App developer didn't
respond.
July 2nd: App developer queried again, but failed to respond.
July 8th: App developer got his 3rd notice, but failed to respond.
July 9th: full disclosure.
Technical details
==================
RootExplorer is a rooted Android App aimed to ultimately control file
operations on an Android device.
Unfortunately, RootExplorer tries to download an external busybox from
plain a HTTP website, which might cause rooted remote code execution.
Blogpost
=======
http://securitygodmode.blogspot.com/2016/07/android-attack-surfaces-part-ii.html
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/